Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe
-
Size
274KB
-
MD5
4b4ada13fecfa4522cf86872533ff6d5
-
SHA1
e2039529bbf3ca7230aa4e9daf7f55e82d240041
-
SHA256
1d054d29b1878749f5393c9edf7e44403efc9f2a61129bea12cc75a3b71ff149
-
SHA512
acf51ad0953144a4d582f7f59cce256b641aac5839dba438d8c71b710f00f411536bab9a96be8afa9647acc312454b17f282e55983884a325b7eec7a20d93f43
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2184 .exe -
Loads dropped DLL 2 IoCs
pid Process 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\.exe 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe File opened for modification C:\Program Files\.exe 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 2184 .exe 2184 .exe 2184 .exe 2184 .exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2184 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 28 PID 1936 wrote to memory of 2184 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 28 PID 1936 wrote to memory of 2184 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 28 PID 1936 wrote to memory of 2184 1936 2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-22_4b4ada13fecfa4522cf86872533ff6d5_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files\.exe"C:\Program Files\\.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5401b636d41ce5ec95f8673c995b1043d
SHA12bf61d357c5ffa804b2657d9471d3847eac21ed1
SHA256f9dc5f4bd50044ca44bfd9f1658fff2bf68be6cd52b020b5d85a8afa4a964988
SHA512f845d4547096415814e34c7b3e8e908bc7f363961c77213b13df5f6f34bfd8a3ebac4254914563acd82685f8e29c87aae8900404d7d274d1ab0b164142d5d067